//===-- sanitizer_win_dll_thunk.cpp ---------------------------------------===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // This file defines a family of thunks that should be statically linked into // the DLLs that have instrumentation in order to delegate the calls to the // shared runtime that lives in the main binary. // See https://github.com/google/sanitizers/issues/209 for the details. //===----------------------------------------------------------------------===// #ifdef SANITIZER_DLL_THUNK #include "sanitizer_win_defs.h" #include "sanitizer_win_dll_thunk.h" #include "interception/interception.h" extern "C" { void *WINAPI GetModuleHandleA(const char *module_name); void abort(); } namespace __sanitizer { uptr dllThunkGetRealAddrOrDie(const char *name) { uptr ret = __interception::InternalGetProcAddress((void *)GetModuleHandleA(0), name); if (!ret) abort(); return ret; } int dllThunkIntercept(const char* main_function, uptr dll_function) { uptr wrapper = dllThunkGetRealAddrOrDie(main_function); if (!__interception::OverrideFunction(dll_function, wrapper, 0)) abort(); return 0; } int dllThunkInterceptWhenPossible(const char* main_function, const char* default_function, uptr dll_function) { uptr wrapper = __interception::InternalGetProcAddress( (void *)GetModuleHandleA(0), main_function); if (!wrapper) wrapper = dllThunkGetRealAddrOrDie(default_function); if (!__interception::OverrideFunction(dll_function, wrapper, 0)) abort(); return 0; } } // namespace __sanitizer // Include Sanitizer Common interface. #define INTERFACE_FUNCTION(Name) INTERCEPT_SANITIZER_FUNCTION(Name) #define INTERFACE_WEAK_FUNCTION(Name) INTERCEPT_SANITIZER_WEAK_FUNCTION(Name) #include "sanitizer_common_interface.inc" #pragma section(".DLLTH$A", read) #pragma section(".DLLTH$Z", read) typedef void (*DllThunkCB)(); extern "C" { __declspec(allocate(".DLLTH$A")) DllThunkCB __start_dll_thunk; __declspec(allocate(".DLLTH$Z")) DllThunkCB __stop_dll_thunk; } // Disable compiler warnings that show up if we declare our own version // of a compiler intrinsic (e.g. strlen). #pragma warning(disable: 4391) #pragma warning(disable: 4392) extern "C" int __dll_thunk_init() { static bool flag = false; // __dll_thunk_init is expected to be called by only one thread. if (flag) return 0; flag = true; for (DllThunkCB *it = &__start_dll_thunk; it < &__stop_dll_thunk; ++it) if (*it) (*it)(); // In DLLs, the callbacks are expected to return 0, // otherwise CRT initialization fails. return 0; } // We want to call dll_thunk_init before C/C++ initializers / constructors are // executed, otherwise functions like memset might be invoked. #pragma section(".CRT$XIB", long, read) __declspec(allocate(".CRT$XIB")) int (*__dll_thunk_preinit)() = __dll_thunk_init; static void WINAPI dll_thunk_thread_init(void *mod, unsigned long reason, void *reserved) { if (reason == /*DLL_PROCESS_ATTACH=*/1) __dll_thunk_init(); } #pragma section(".CRT$XLAB", long, read) __declspec(allocate(".CRT$XLAB")) void (WINAPI *__dll_thunk_tls_init)(void *, unsigned long, void *) = dll_thunk_thread_init; #endif // SANITIZER_DLL_THUNK